Best Sellers in Books
Discover the most popular and best selling products in Books based on sales

Disclosure: I get commissions for purchases made through links in this website
Networking & Cloud Computing - Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2

Description

Book Synopsis: Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.

This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)―the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).

What You’ll Learn

  • Understand key identity management concepts
  • Incorporate essential design principles
  • Design authentication and access control for a modern application
  • Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0)
  • Review historical failures and know how to avoid them

Who This Book Is For

Developers, enterprise or application architects, business application or product owners, and anyone involved in an application’s identity management solution

Details

Are you looking to protect your application and the sensitive data it manages? Look no further! Our book, "Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2," is the ultimate guide for understanding and implementing identity management. In today's world, security breaches can result in severe penalties, making it crucial for developers and owners to have a solid grasp of identity management. With this book, you'll learn everything from account provisioning to authentication and authorization. Plus, we've included troubleshooting tips and common problems to avoid. Don't wait any longer – get your copy now and build applications with confidence!

Our expanded edition of "Solving Identity and Access Management in Modern Applications" is even better than before. We now provide an in-depth overview of the new version of OAuth (2.1) and highlight the primary changes. We've also added a section on the OAuth 2.0 Device Authorization Grant, which is especially useful for devices with limited UI capability. In addition, we cover topics such as identity proofing, consent information organization, and the impact of tracking prevention technology on identity protocols. This book has it all!

What sets us apart from other books on identity management is our focus on practicality. Alongside comprehensive explanations, we provide coding samples and application best practices. Whether you're a developer, architect, or product owner, this book is tailored to suit your needs. You'll gain a deep understanding of key identity management concepts, essential design principles, and the frameworks and protocols used today such as OIDC, OAuth 2.0/2.1, and SAML 2.0.

Don't miss out on this essential resource that will empower you to design secure applications and prevent historical failures. Order your copy of "Solving Identity Management in Modern Applications" today and take control of your application's identity management solution.

Get your copy now and start building secure applications!

Disclosure: I get commissions for purchases made through links in this website